1 / 39

GROUP MEMBERS Chan Li Suman Lohani Prabhu Sundaram

Hacking and its Defense. GROUP MEMBERS Chan Li Suman Lohani Prabhu Sundaram. Objective. Why this topic?? Surprising Facts on Hacking – U.S. Department of Defense is attacked some 250,000 times each year - Source: The Business Journal

rasha
Télécharger la présentation

GROUP MEMBERS Chan Li Suman Lohani Prabhu Sundaram

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking and its Defense GROUP MEMBERS Chan Li Suman Lohani Prabhu Sundaram

  2. Objective • Why this topic?? Surprising Facts on Hacking – • U.S. Department of Defense is attacked some 250,000 times each year - Source: The Business Journal • A Microsoft-operated site was cracked and defaced Monday by someone calling himself “flipz.” It was the first time a Microsoft Web site has been breached successfully. - Dated: oct 26 Source: abc.com • Worldwide cost of the Code Red computer worms that were unleashed on the Internet in July and August has reached about $2.6 billion U.S. ($1.1 billion in clean-up costs and $1.5 billion in lost productivity) - Source: www.ns2000.org

  3. Estimated total cost for 2001- $15 billion • Love Bug - $8.7 billion • Melissa- $1.2 billion • Explorer-$1 billion • SirCam- $1.035 billion • Finally, www would have been radically different if there were no Hackers.

  4. Cost of virus attacks on information systems around the world • 2000 - $17.1 billion • 1999 - $12.1 billion • Here, we will Discuss the practice of hacking in general and demonstrate a few of the current common methods, exploits and Preventions….

  5. Reasons to hack !! • Curiosity • Fame • Belief in open systems • Revenge • Notoriety/Fame • Profit ($$$ or other gain) • Revolutionary

  6. Glossary • Hacking – 2 definitions1.Hobby/Profession of working with computers.2. Hacking refers to acts of unauthorized access or intrusion, in a computer, network, or telecom system by means of computer device, gadget and or softwares. –often referred to as the 2nd one who refer cyber criminals as “Crackers”

  7. Phreaking- The art and Science of Cracking the Phone Network (for eg: free long- distance calls). By extension, security – cracking especially communication networks. • Back-Door Program-A feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. If hackers or others learn about a back door, the feature may pose a security risk.

  8. Glossary • Smurfing - Popular hacking technique by which attackers can persuade your network to perform a denial of service attack on a machine somewhere else on the Internet. Such attacks can also generate large quantities of traffic on your network… Prevention: use a line: no ip directed-broadcast • SpoofingA common technique used to attack sites is to create TCP/IP packets which appear to be from local IP addresses.Prevention: The site router is in an ideal place to detect and prevent these attacks, since it can detect when packets with internal source addresses arrive on the external interface of the router…

  9. Glossary • Trojan Horse Program A program which may be planted on your hard drive • by an email message attachment, and may be designed to send • information about your system back to the hackers which wrote it. • Spy Ware A program which you have downloaded from a legitimate company, but which—unbeknownst to you—has been written to track your every move on the internet for marketing purposes and send the information back to the company.

  10. Glossary • Denial of ServiceAn attack specifically designed to prevent the normal functioning of a system and thereby to prevent lawful access to the system by authorized users. Hackers can cause denial of service attacks by destroying or modifying data or by overloading the system's servers until service to authorized users is delayed or prevented. • Sniffing The use of a sniffer to capture passwords as they cross a network. The network could be a local area network, or the Internet itself. The sniffer can be hardware or software.

  11. Glossary • Virus - Vital Information Resources Under Siege A computer virus is a specific type of malicious computer code that replicates itself or inserts copies or new versions of itself in other programs. • WormWorms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network

  12. Damages likely be Caused !! • Stealing or destroying data • Disabling protection systems • Shutting down entire networks • Disclosure of Information, such as theft of credit card numbers • Denial of service attacks including Smurfing…

  13. A common methodology is the following • 1. Gather target information. • 2. Identify services offered by target to the public (whether intentional or not). • 3. Research the discovered services for known vulnerabilities. • 4. Attempt to exploit the services. • 5. Utilize exploited services to gain additional privileges from the target. Reiterate steps 1-5 until goals are achieved.

  14. Steps Hackers generally follow !! Step 1: Gather target information.. • Domain names, IP address ranges • InterNIC contact information • Physical addresses • Organizational structures • Alliances and financial information • Names of officers, managers, technical staff • Newsgroup posts

  15. Step 2: Indentify services !! • Web Servers • FTP Servers • DNS Servers • e-mail gateways • Help desks/phone support • other (gopher, LDAP, irc, etc.)

  16. Step 3:Research vulnerabilities • Vendor announcements. • Default configurations. • Poor configurations. (ie. Passwords, cleartext protocols) • Gather available exploits or develop new exploit • Derived exploits • Some original work.

  17. Step 4:Exploit Vulnerabilities. • Attempt to exploit vulnerabilities to gain access to the target. • Continue until Successful. Step 5:Utilize increased access • Exploit additional vulnerabilities to gain additional access and information to use in penetrating further into an organization. • The hacker "becomes" a legitimate user (even an administrator).

  18. Demo on IIS Web Exploit !! • Only requires normal web user access to an IIS webserver (i.e. port 80 or 443). • Using non-standard ports for your web server only makes this marginally more difficult. You do publish how to access your webserver to someone, right? (also, you would be surprised what search engines contain about you.) • Using SSL (https protocol) will not prevent the exploit from succeeding.

  19. Demo : Software Levels • Target: Windows NT Server 4.0sp6a, IIS 4.0 • Attacker: Linux 2.2.17-21mdk kernel, Window NT Worstation 4.0 sp6a

  20. Demo : Target info • Target IP address is 192.168.168.125 • Query whois database at ARIN.net to locate owner and domain information. • Also try reverse DNS mappings for host/domain names.

  21. Demo : Services information Use nmap to scan target for services of interest. $ nmap -sS -p 21-25,80,135-139,443 192.168.168.125 Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ ) Interesting ports on (192.168.168.125): (The 7 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https Nmap run completed -- 1 IP address (1 host up) scanned in 1 second

  22. Demo: Research services Use netcat or telnet commands to determine web server information. $ nc 198.168.168.125 80 HEAD / HTTP/1.0 <CR> HTTP/1.1 200 OK Server: Microsoft-IIS/4.0 Content-Location: http://192.168.168.125/Default.htm Date: Mon, 06 Aug 2001 23:40:10 GMT Content-Type: text/html Accept-Ranges: bytes Last-Modified: Mon, 30 Jul 2001 15:28:47 GMT ETag: "c0bf6c53c19c11:b50" Content-Length: 4325

  23. Demo : Exploit services to gain access • Unicode “dot dot” exploit to traverse filesystem • Default configuration of Inetpub\scripts directory is used to upload and execute commands of our choice. • Get target to fetch useful commands. • Get target to initiate a command session. • Use target to obtain additional information.

  24. Prevention on IIS • Stay current on patch levels for Microsoft's OS and web server. • Implement good firewalling. • Use an IDS system (or two!). • Host security is important (Microsoft's "Securing IIS” and “Securing Windows NT” documents). • Pattern matching intercept proxies.

  25. Demonstration • Ping, ifconfig, tracert(Icmp) Hacking tools • IP – tools.exe • Wotweb.exe • Superscan.exe

  26. Prevention • The Price of a New Web Server $ 800 • The Price of the Application Firewall $ 2500 Having to tell your boss that you’ve Just been Hacked!! • PRICELESS!!

  27. Some Defense Arsenals for Computer Security!! • Password Protection • AntiVirus Software • Encryption • Audit Trails • Smart Cards and Biometrics • Firewalls • Here we will focus about Firewalls…

  28. Firewall Firewall H/W firewall S/W firewall Router/internet gatewaysApplication Packet Proxy filtering Firewall firewall (Squid: -Microsoft proxy server) (ipchains:-Linux)

  29. There are two types of Firewall. • Dual Homed • 2. Demilitarized Setup.

  30. Dual Homed (Secure Network) Internet Router Firewall + router +DHCP Server Hub Comp Comp Comp Comp Comp Comp Comp

  31. Internet Demilitarized Setup(More Secure Network) Firewall Web Server mail DNS Firewall mail DNS Database Server

  32. Firewall Products • Some Firewall Providers: • McAFEE ASAP • Trend Micro • Zone Alarm.. Single user- Cost $ 40 (for 1 year) 50 users - Cost $1500 • Some Versions of it are Free to download…..

  33. Useful security related links !! • SANS Institute (www.sans.org) • Security Focus Archives (www.securityfocus.com) • Snort IDS home (www.snort.org) • Security archives (archives.neohapsis.com) • CERT Coordination Center (www.cert.org) • http://www.courses.dsu.edu/ infs750 • www.insecure.org

  34. Mailing Lists • Risks Digest (www.risks.org) • BUGTRAQ (www.securityfocus.com/bugtraq/archive) • NTBugtraq (www.ntbugtraq.com) • Win2KSecurity Advice (www.ntsecurity.net)

  35. Securing Web servers • Apache project (www.apache.org) http://httpd.apache.org/docs/misc/tutorials.html • support.microsoft.com "Resources for Securing Internet Information Services”, Article ID Q282060.

  36. Conclusion • How to prevent becoming a target? !! The only reliable solution to reduce the risk of a successful intrusion attempt is staying current with your security infrastructure. This is an ongoing dynamic process. !! Areas to be explored includes • More about Hackers • SSL, L2TP, Proxy servers (security devices and software) • More on Server Vulnerabilities • Data Protection

More Related